ºÝºÝߣshows by User: jcleblanc / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: jcleblanc / Thu, 21 Mar 2019 17:46:56 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: jcleblanc JavaScript App Security: Auth and Identity on the Client /slideshow/javascript-app-security-auth-and-identity-on-the-client/137537931 03-2019-javascript-app-security-190321174657
The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development. In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.]]>

The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development. In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.]]>
Thu, 21 Mar 2019 17:46:56 GMT /slideshow/javascript-app-security-auth-and-identity-on-the-client/137537931 jcleblanc@slideshare.net(jcleblanc) JavaScript App Security: Auth and Identity on the Client jcleblanc The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development. In this session we'll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/03-2019-javascript-app-security-190321174657-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The story is always the same; if you want to create a JavaScript centric app with API and identity security, you’re told that you need to have a server-side component for handling your identity and application security. That’s simply not the case in modern development. In this session we&#39;ll look at client-side identity, API, and token security, exploring token downscoping methodologies, key management tools, and security on the client.
JavaScript App Security: Auth and Identity on the Client from Jonathan LeBlanc
]]>
640 2 https://cdn.slidesharecdn.com/ss_thumbnails/03-2019-javascript-app-security-190321174657-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Improving Developer Onboarding Through Intelligent Data Insights /slideshow/improving-developer-onboarding-through-intelligent-data-insights/137537514 02-2019-improving-dev-onboarding-data-insights-190321174527
A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you. In this talk we'll run through: - How to track valuable developer path insights, from moments of anxiety to time to first valuable call. - Overlaying support and ticketing information on top of developer path data to decrease developer friction. - How to create automated analytics systems to measure success. - When these systems should be built, before it's too late.]]>

A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you. In this talk we'll run through: - How to track valuable developer path insights, from moments of anxiety to time to first valuable call. - Overlaying support and ticketing information on top of developer path data to decrease developer friction. - How to create automated analytics systems to measure success. - When these systems should be built, before it's too late.]]>
Thu, 21 Mar 2019 17:45:27 GMT /slideshow/improving-developer-onboarding-through-intelligent-data-insights/137537514 jcleblanc@slideshare.net(jcleblanc) Improving Developer Onboarding Through Intelligent Data Insights jcleblanc A developer platform lives and dies by it's developer community. When huge problems need to be solved, it's easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you. In this talk we'll run through: - How to track valuable developer path insights, from moments of anxiety to time to first valuable call. - Overlaying support and ticketing information on top of developer path data to decrease developer friction. - How to create automated analytics systems to measure success. - When these systems should be built, before it's too late. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/02-2019-improving-dev-onboarding-data-insights-190321174527-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A developer platform lives and dies by it&#39;s developer community. When huge problems need to be solved, it&#39;s easy to make valuable improvements, but what do you do when those are solved and you still see high bounce rates on your site, low developer application completion, and generally poor adoption of your product? This is where your data can save you. In this talk we&#39;ll run through: - How to track valuable developer path insights, from moments of anxiety to time to first valuable call. - Overlaying support and ticketing information on top of developer path data to decrease developer friction. - How to create automated analytics systems to measure success. - When these systems should be built, before it&#39;s too late.
Improving Developer Onboarding Through Intelligent Data Insights from Jonathan LeBlanc
]]>
347 2 https://cdn.slidesharecdn.com/ss_thumbnails/02-2019-improving-dev-onboarding-data-insights-190321174527-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Better Data with Machine Learning and Serverless /slideshow/better-data-with-machine-learning-and-serverless-120438318/120438318 10-2018-better-data-ml-serverless-181023133018
Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix. Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past. With this in mind, we’ll look at: - How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems. - Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system. - Considerations and practical examples of working with the security implications of dealing with sensitive information.]]>

Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix. Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past. With this in mind, we’ll look at: - How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems. - Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system. - Considerations and practical examples of working with the security implications of dealing with sensitive information.]]>
Tue, 23 Oct 2018 13:30:18 GMT /slideshow/better-data-with-machine-learning-and-serverless-120438318/120438318 jcleblanc@slideshare.net(jcleblanc) Better Data with Machine Learning and Serverless jcleblanc Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix. Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past. With this in mind, we’ll look at: - How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems. - Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system. - Considerations and practical examples of working with the security implications of dealing with sensitive information. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/10-2018-better-data-ml-serverless-181023133018-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Creating valuable insights out of raw data files, such as audio or video, has traditionally been a very manual and tedious process, and has produced mixed results due to an influential human element in the mix. Thanks to enhancements in machine learning systems, coupled with the rapidly deployable nature of serverless technology as a middleware layer, we are able to create highly sophisticated data insight platforms to replace the huge time requirements that have typically been required in the past. With this in mind, we’ll look at: - How to build end-to-end data insight and predictor systems, built on the back of serverless and machine learning systems. - Best practices for working with serverless technology for ferrying information between raw data files and machine learning systems through an eventing system. - Considerations and practical examples of working with the security implications of dealing with sensitive information.
Better Data with Machine Learning and Serverless from Jonathan LeBlanc
]]>
437 4 https://cdn.slidesharecdn.com/ss_thumbnails/10-2018-better-data-ml-serverless-181023133018-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Best Practices for Application Development with Box /slideshow/best-practices-for-application-development-with-box/112135354 best-practices-box-apps-v2-180829173330
Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics.]]>

Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics.]]>
Wed, 29 Aug 2018 17:33:30 GMT /slideshow/best-practices-for-application-development-with-box/112135354 jcleblanc@slideshare.net(jcleblanc) Best Practices for Application Development with Box jcleblanc Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/best-practices-box-apps-v2-180829173330-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Covering the best practices for building new applications on top of Box platform, including token management, error condition and program flow, architecture, and other such topics.
Best Practices for Application Development with Box from Jonathan LeBlanc
]]>
435 3 https://cdn.slidesharecdn.com/ss_thumbnails/best-practices-box-apps-v2-180829173330-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Box Platform Overview /slideshow/box-platform-overview/110733394 082018boxplatformoverview-180820201040
Overview of the major technical concepts and knowledge needed for working with Box Platform. ]]>

Overview of the major technical concepts and knowledge needed for working with Box Platform. ]]>
Mon, 20 Aug 2018 20:10:39 GMT /slideshow/box-platform-overview/110733394 jcleblanc@slideshare.net(jcleblanc) Box Platform Overview jcleblanc Overview of the major technical concepts and knowledge needed for working with Box Platform. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/082018boxplatformoverview-180820201040-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Overview of the major technical concepts and knowledge needed for working with Box Platform.
Box Platform Overview from Jonathan LeBlanc
]]>
4306 10 https://cdn.slidesharecdn.com/ss_thumbnails/082018boxplatformoverview-180820201040-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Box Platform Developer Workshop /slideshow/box-platform-developer-workshop/109418180 workshopmaster-180810211134
Box platform overview, covering all topics needed for working with the Box developer platform.]]>

Box platform overview, covering all topics needed for working with the Box developer platform.]]>
Fri, 10 Aug 2018 21:11:34 GMT /slideshow/box-platform-developer-workshop/109418180 jcleblanc@slideshare.net(jcleblanc) Box Platform Developer Workshop jcleblanc Box platform overview, covering all topics needed for working with the Box developer platform. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/workshopmaster-180810211134-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Box platform overview, covering all topics needed for working with the Box developer platform.
Box Platform Developer Workshop from Jonathan LeBlanc
]]>
657 3 https://cdn.slidesharecdn.com/ss_thumbnails/workshopmaster-180810211134-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modern Cloud Data Security Practices /slideshow/modern-cloud-data-security-practices/93888135 moderncloudsecurity042018-180415075145
This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as: - How global compliance and regulations affect security practices. - Handling data permissions, identity, and security with application access to data. - Considerations, trends, and standards for global data availability.]]>

This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as: - How global compliance and regulations affect security practices. - Handling data permissions, identity, and security with application access to data. - Considerations, trends, and standards for global data availability.]]>
Sun, 15 Apr 2018 07:51:44 GMT /slideshow/modern-cloud-data-security-practices/93888135 jcleblanc@slideshare.net(jcleblanc) Modern Cloud Data Security Practices jcleblanc This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as: - How global compliance and regulations affect security practices. - Handling data permissions, identity, and security with application access to data. - Considerations, trends, and standards for global data availability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/moderncloudsecurity042018-180415075145-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This topic will go through current standards and future trends for building a scalable security model for distributed cloud based data. We’ll look into practices and considerations behind handing highly privileged data globally, diving into topics such as: - How global compliance and regulations affect security practices. - Handling data permissions, identity, and security with application access to data. - Considerations, trends, and standards for global data availability.
Modern Cloud Data Security Practices from Jonathan LeBlanc
]]>
624 2 https://cdn.slidesharecdn.com/ss_thumbnails/moderncloudsecurity042018-180415075145-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Box Authentication Types /slideshow/box-authentication-types/80711191 authtypes10102017-171011200630
Breakout session given at BoxWorks 2017.]]>

Breakout session given at BoxWorks 2017.]]>
Wed, 11 Oct 2017 20:06:30 GMT /slideshow/box-authentication-types/80711191 jcleblanc@slideshare.net(jcleblanc) Box Authentication Types jcleblanc Breakout session given at BoxWorks 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/authtypes10102017-171011200630-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Breakout session given at BoxWorks 2017.
Box Authentication Types from Jonathan LeBlanc
]]>
1234 7 https://cdn.slidesharecdn.com/ss_thumbnails/authtypes10102017-171011200630-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Box UI Elements /slideshow/understanding-box-ui-elements/80634034 elements10052017-171010035151
Box training content for understanding the different Box UI Elements, how to configure them, and what methods / scopes are available to them.]]>

Box training content for understanding the different Box UI Elements, how to configure them, and what methods / scopes are available to them.]]>
Tue, 10 Oct 2017 03:51:51 GMT /slideshow/understanding-box-ui-elements/80634034 jcleblanc@slideshare.net(jcleblanc) Understanding Box UI Elements jcleblanc Box training content for understanding the different Box UI Elements, how to configure them, and what methods / scopes are available to them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/elements10052017-171010035151-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Box training content for understanding the different Box UI Elements, how to configure them, and what methods / scopes are available to them.
Understanding Box UI Elements from Jonathan LeBlanc
]]>
1325 10 https://cdn.slidesharecdn.com/ss_thumbnails/elements10052017-171010035151-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Box applications, tokens, and scoping /slideshow/understanding-box-applications-tokens-and-scoping/80634028 boxtokensscopes10062017-171010035140
Box training content for understanding how to set up applications, work with scopes, and provision tokens.]]>

Box training content for understanding how to set up applications, work with scopes, and provision tokens.]]>
Tue, 10 Oct 2017 03:51:40 GMT /slideshow/understanding-box-applications-tokens-and-scoping/80634028 jcleblanc@slideshare.net(jcleblanc) Understanding Box applications, tokens, and scoping jcleblanc Box training content for understanding how to set up applications, work with scopes, and provision tokens. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/boxtokensscopes10062017-171010035140-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Box training content for understanding how to set up applications, work with scopes, and provision tokens.
Understanding Box applications, tokens, and scoping from Jonathan LeBlanc
]]>
352 3 https://cdn.slidesharecdn.com/ss_thumbnails/boxtokensscopes10062017-171010035140-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Future of Online Money: Creating Secure Payments Globally /slideshow/the-future-of-online-money-creating-secure-payments-globally/75884843 2017maywodfutureonlinepayments-170511113913
Keynote from the We Are Developers conference (Vienna, Austria) on May 11th, 2017.]]>

Keynote from the We Are Developers conference (Vienna, Austria) on May 11th, 2017.]]>
Thu, 11 May 2017 11:39:12 GMT /slideshow/the-future-of-online-money-creating-secure-payments-globally/75884843 jcleblanc@slideshare.net(jcleblanc) The Future of Online Money: Creating Secure Payments Globally jcleblanc Keynote from the We Are Developers conference (Vienna, Austria) on May 11th, 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017maywodfutureonlinepayments-170511113913-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Keynote from the We Are Developers conference (Vienna, Austria) on May 11th, 2017.
The Future of Online Money: Creating Secure Payments Globally from Jonathan LeBlanc
]]>
554 2 https://cdn.slidesharecdn.com/ss_thumbnails/2017maywodfutureonlinepayments-170511113913-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modern API Security with JSON Web Tokens /slideshow/modern-api-security-with-json-web-tokens/69929632 2016decconfoojwtoauth-161207204327
Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs. In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.]]>

Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs. In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.]]>
Wed, 07 Dec 2016 20:43:27 GMT /slideshow/modern-api-security-with-json-web-tokens/69929632 jcleblanc@slideshare.net(jcleblanc) Modern API Security with JSON Web Tokens jcleblanc Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs. In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016decconfoojwtoauth-161207204327-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Building a modern API architecture is a constant struggle between ease of development and security. JSON Web Tokens (JWTs) introduce a means of building authentication into JSON objects being transmitted through APIs. In this session we’ll explore how JWTs work to build verifiable and trusted objects, allowing them to be combined with standards such as OAuth 2 for capturing access tokens, leading to a secure means of JavaScript SDK dev.
Modern API Security with JSON Web Tokens from Jonathan LeBlanc
]]>
3822 7 https://cdn.slidesharecdn.com/ss_thumbnails/2016decconfoojwtoauth-161207204327-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Creating an In-Aisle Purchasing System from Scratch /slideshow/creating-an-inaisle-purchasing-system-from-scratch/69847314 2016decconfooinaislepurchasingsystem-161205194648
The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout. In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.]]>

The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout. In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.]]>
Mon, 05 Dec 2016 19:46:48 GMT /slideshow/creating-an-inaisle-purchasing-system-from-scratch/69847314 jcleblanc@slideshare.net(jcleblanc) Creating an In-Aisle Purchasing System from Scratch jcleblanc The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout. In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016decconfooinaislepurchasingsystem-161205194648-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The future of retail is in removing the divide between the offline shopping state and the enhanced online buying experience. To create this type of enhanced retail experience, we can remove complexities in the process, such as simplifying checkout. In this session we’ll learn how to use internet-connected microelectronics to attach to a buyer’s mobile device to provide the functionality to buy products right from the aisle.
Creating an In-Aisle Purchasing System from Scratch from Jonathan LeBlanc
]]>
504 3 https://cdn.slidesharecdn.com/ss_thumbnails/2016decconfooinaislepurchasingsystem-161205194648-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Payments Over Mixed Communication Media /slideshow/secure-payments-over-mixed-communication-media-62361884/62361884 2016maysignalsecurepayments-160524212922
As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments? In this session you'll learn how to apply fundamental security precepts in potentially insecure environments. Topics include: Securing identity and payment data through voice commands or text Tokenization and encryption security Triggering secure transactions from communications media]]>

As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments? In this session you'll learn how to apply fundamental security precepts in potentially insecure environments. Topics include: Securing identity and payment data through voice commands or text Tokenization and encryption security Triggering secure transactions from communications media]]>
Tue, 24 May 2016 21:29:22 GMT /slideshow/secure-payments-over-mixed-communication-media-62361884/62361884 jcleblanc@slideshare.net(jcleblanc) Secure Payments Over Mixed Communication Media jcleblanc As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments? In this session you'll learn how to apply fundamental security precepts in potentially insecure environments. Topics include: Securing identity and payment data through voice commands or text Tokenization and encryption security Triggering secure transactions from communications media <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016maysignalsecurepayments-160524212922-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As web enabled systems become an integral part of everything we interact with, how do we secure data in potential unsecure environments? In this session you&#39;ll learn how to apply fundamental security precepts in potentially insecure environments. Topics include: Securing identity and payment data through voice commands or text Tokenization and encryption security Triggering secure transactions from communications media
Secure Payments Over Mixed Communication Media from Jonathan LeBlanc
]]>
682 4 https://cdn.slidesharecdn.com/ss_thumbnails/2016maysignalsecurepayments-160524212922-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting the Future of Mobile Payments /slideshow/protecting-the-future-of-mobile-payments-58763946/58763946 2016febconfooprotectingmobilepayments-160226155733
We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.]]>

We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.]]>
Fri, 26 Feb 2016 15:57:32 GMT /slideshow/protecting-the-future-of-mobile-payments-58763946/58763946 jcleblanc@slideshare.net(jcleblanc) Protecting the Future of Mobile Payments jcleblanc We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016febconfooprotectingmobilepayments-160226155733-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> We are in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices roaming around unsecured locations, especially when they want to pay for something. Learn the secrets behind building a secure mobile backbone, as we explore how to harden security, build systems based on identity confidence, and work towards a future proofed mobile framework.
Protecting the Future of Mobile Payments from Jonathan LeBlanc
]]>
1837 5 https://cdn.slidesharecdn.com/ss_thumbnails/2016febconfooprotectingmobilepayments-160226155733-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Node.js Authentication and Data Security /slideshow/nodejs-authentication-and-data-security-58676481/58676481 2016febconfooidentitydatasecurity-160224192945
The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.]]>

The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.]]>
Wed, 24 Feb 2016 19:29:45 GMT /slideshow/nodejs-authentication-and-data-security-58676481/58676481 jcleblanc@slideshare.net(jcleblanc) Node.js Authentication and Data Security jcleblanc The arena of proper auth & data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016febconfooidentitydatasecurity-160224192945-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The arena of proper auth &amp; data security standards is often some of the most misunderstood, confusing, and tricky aspects of building Node apps. Using open source auth techniques and proper data encryption standards, we’ll learn how to make intelligent decisions on creating a solid infrastructure to protect our users and data. We’ll dive into auth systems, data attack vectors, how to protect your systems, and common security pitfalls in Node.
Node.js Authentication and Data Security from Jonathan LeBlanc
]]>
3035 6 https://cdn.slidesharecdn.com/ss_thumbnails/2016febconfooidentitydatasecurity-160224192945-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PHP Identity and Data Security /slideshow/php-identity-and-data-security/57887904 2016febphpidentitydatasecurity-160204170910
The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4 There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it's locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong. In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We'll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application.]]>

The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4 There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it's locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong. In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We'll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application.]]>
Thu, 04 Feb 2016 17:09:10 GMT /slideshow/php-identity-and-data-security/57887904 jcleblanc@slideshare.net(jcleblanc) PHP Identity and Data Security jcleblanc The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4 There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it's locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong. In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We'll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016febphpidentitydatasecurity-160204170910-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The screencast of this presentation can be found at https://youtu.be/o3uy7dgG_n4 There is an assumption in the industry, amongst companies large and small alike, that if they store sensitive user data (and sometimes do some mild encryption) in their database, it&#39;s locked in and secured from potential attacks. People rely too heavily on their false assumptions of security, and it usually ends up costing them extensively when that is proven wrong. In this session, Jonathan will build a foundation for identity and data security that everyone dealing with sensitive data should understand. We&#39;ll break down concepts of identity security, common attack vectors and how to protect yourself, and how to harden your web application.
PHP Identity and Data Security from Jonathan LeBlanc
]]>
32491 6 https://cdn.slidesharecdn.com/ss_thumbnails/2016febphpidentitydatasecurity-160204170910-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Payments Over Mixed Communication Media /slideshow/secure-payments-over-mixed-communication-media/55619995 2015novdevfestistanbulsecurepaymentsmixedmedia-151129110752-lva1-app6891
Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm. As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like: * Securing identity and payment data through voice commands or text. * Tokenization and encryption security. * Techniques for triggering secure transactions from communications media. At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments.]]>

Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm. As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like: * Securing identity and payment data through voice commands or text. * Tokenization and encryption security. * Techniques for triggering secure transactions from communications media. At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments.]]>
Sun, 29 Nov 2015 11:07:52 GMT /slideshow/secure-payments-over-mixed-communication-media/55619995 jcleblanc@slideshare.net(jcleblanc) Secure Payments Over Mixed Communication Media jcleblanc Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm. As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like: * Securing identity and payment data through voice commands or text. * Tokenization and encryption security. * Techniques for triggering secure transactions from communications media. At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015novdevfestistanbulsecurepaymentsmixedmedia-151129110752-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web enabled systems are now an integral part of everything we interact with, from microelectronics to voice enabled hardware, from text messages and phone calls to email, and really we’re just limited by our imaginations as to what we can connect. As we explore vast new realms of communication over mixed digital media, we have to ask ourselves how we protect our critical data within potential unsecure environments. Going beyond that, how do we protect some of our more critical data, payment information, in this same realm. As we look at a multitude of different environments, we’ll be exploring how to secure user identity and payment information through the communication channels, covering topics like: * Securing identity and payment data through voice commands or text. * Tokenization and encryption security. * Techniques for triggering secure transactions from communications media. At the end of the session, we’ll have a stronger understanding of proper techniques for working with new communication media sources, and see how we can apply fundamental security precepts in potentially insecure environments.
Secure Payments Over Mixed Communication Media from Jonathan LeBlanc
]]>
1284 4 https://cdn.slidesharecdn.com/ss_thumbnails/2015novdevfestistanbulsecurepaymentsmixedmedia-151129110752-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting the Future of Mobile Payments /slideshow/protecting-the-future-of-mobile-payments/48686958 2015mayprotectingfuturemobilepayments-150528033659-lva1-app6892
Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something. In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.]]>

Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something. In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.]]>
Thu, 28 May 2015 03:36:59 GMT /slideshow/protecting-the-future-of-mobile-payments/48686958 jcleblanc@slideshare.net(jcleblanc) Protecting the Future of Mobile Payments jcleblanc Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something. In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015mayprotectingfuturemobilepayments-150528033659-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Audio from the session at OSCON (Portland, OR) on July 22nd, 2015 is available at https://archive.org/details/protecting_future_mobile_payments We are now in an age where more people have phones than toilets, and there are more active cell phones than people on the planet. How do we protect all of these devices as they’re roaming around unsecured locations, especially when we want to pay for something. In this talk we’re going to rip apart the illusion of mobile security and explore some of the most difficult to secure experiences: payments. We’ll cover the concepts of building a rich feature set to protect the user, how to encrypt all interactions, building scalable trust zones, and extending identification with wearables and biometrics.
Protecting the Future of Mobile Payments from Jonathan LeBlanc
]]>
10855 35 https://cdn.slidesharecdn.com/ss_thumbnails/2015mayprotectingfuturemobilepayments-150528033659-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Future of Identity, Data, and Wearable Security /slideshow/future-of-identity-data-and-wearable-security/47425660 2015aprtnwfutureidentitydatawearablesecurity-150426085914-conversion-gate01
In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We'll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems.]]>

In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We'll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems.]]>
Sun, 26 Apr 2015 08:59:14 GMT /slideshow/future-of-identity-data-and-wearable-security/47425660 jcleblanc@slideshare.net(jcleblanc) Future of Identity, Data, and Wearable Security jcleblanc In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We'll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015aprtnwfutureidentitydatawearablesecurity-150426085914-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In a world where technology is transforming with mobile devices and wearables, its key to have a solid security backbone. From having a strong password to using biometrics, companies are finding ways to help consumers protect themselves without impacting the experience. We&#39;ll take a look at the current landscape of passwords, the importance of proper systems and how we can use wearables and mobile devices to build trust systems.
Future of Identity, Data, and Wearable Security from Jonathan LeBlanc
]]>
1397 5 https://cdn.slidesharecdn.com/ss_thumbnails/2015aprtnwfutureidentitydatawearablesecurity-150426085914-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-jcleblanc-48x48.jpg?cb=1682066314 Technical developer advocacy thought leader with over 10 years of experience leading technical developer advocacy teams and initiatives, and over 15 years of experience as a software engineer and full stack developer. O'Reilly author with two technical books around identity, security, and social technology, including: * Identity and Data Security for Web Development (July 2016) * Social Application Development (August 2011) Former board member for the OAuth and OpenSocial open specification groups. Lead major identity, security, and social initiatives for companies like PayPal, Yahoo!, and CBS. www.jcleblanc.com https://cdn.slidesharecdn.com/ss_thumbnails/03-2019-javascript-app-security-190321174657-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/javascript-app-security-auth-and-identity-on-the-client/137537931 JavaScript App Securit... https://cdn.slidesharecdn.com/ss_thumbnails/02-2019-improving-dev-onboarding-data-insights-190321174527-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/improving-developer-onboarding-through-intelligent-data-insights/137537514 Improving Developer On... https://cdn.slidesharecdn.com/ss_thumbnails/10-2018-better-data-ml-serverless-181023133018-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/better-data-with-machine-learning-and-serverless-120438318/120438318 Better Data with Machi...